9.1 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello, everybody. And welcome to the agency security episode number 35. Summary
00:06
100 in there and I'll be instructor for physician.
00:11
Well, basically, folks, thank you all for sticking with me through this whole process. Um, I hope you have enjoyed all of the tedious and let me give you a brief summary. Uh, what
00:27
what we covered in scars. You know, first on introduction to information security
00:33
concepts, we saw the information Security one No one comes is like the confidentiality injury availability, that awesome model. You know, all the layers on the awesome off how protocols are, you know, are there service cyber security versus Iraqi security, for example?
00:52
The thing which cause how I t introduces safety
00:57
to the equation on security,
01:00
uh, cross collaboration for I t security because at the end of business are actually communicated between each other's across. Well, evolution cross collaboration is bail.
01:10
Then we have we jumped to the I t main concepts. You know, I t 11 ut common protocols. Both, you know, in every layer off the awesome model like m. Q t t
01:23
chronicles. For example,
01:25
I t common device architecture, a nightie, functional areas
01:30
and we saw anti future. We know I Auntie uses today I t industry and business and the anti future hot. What can we expect and what challenges are ahead for US security engineers?
01:44
I u t security, you know, vulnerabilities, attacks, risk and countermeasures. We saw a couple of hands on examples
01:51
and some frightening media's off. How hackers thing now, or thieves can now steal your car or, you know, demolish that kind of malicious stuff because we're now dealing with I a t.
02:02
Then cryptography. We saw all the concepts, you know, Critter free one on one. Symmetric algorithms, asymmetric algorithms, hashes vigil signatures, polling, key infrastructure for temple. How can we use cryptography cryptography to actually secure our TNT devices?
02:21
Then I A t cloud, you know, club surfaces, Philip threats, cloud providers and club security controls. Basically, all of the stuff you need to take into consideration consideration to either move to the cloud or not. And if you're going to move to the clown, have to select the best provider for yourself,
02:38
and I keep its practices, meaning I suffered development, lifecycle identity and access management, producing risk compliance programs and engine response
02:51
again fools. Thank you all. Thank you. Thank you very much. You can find me a linking and you confound me Treat her Although on Twitter I'm not as active as linking but you know Please reach out Let me know your thoughts and 1000 days we can you know this cause any other subject you want and security
03:10
please reach out Tell me what you think of the curse and I hope again Eunjo to be you Thank you all by
Instructed By
Similar Content